sshdfilter automatically blocks ssh brute force attacks by reading sshd log output in real time and adding iptables rules based on authentication failures. Block rules are created by logging on with an invalid user name, or wrongly guessing the password for an existing account. Block rules...
Platforms: *nix

Sshguard protects networked hosts from the todays widespread brute force attacks against ssh servers. It detects such attacks and blocks the authors address with a firewall rule. This project is BSD licensed. How sshguard works Sshguard monitors ssh servers from their logging activity. It...
Platforms: *nix

RWSecure application parses the /var/log/secure file for invalid usernames or failed passwords to help protect against brute force and similar attacks. If there are more than three invalid or failed attempts by one IP, it will add that IP to your /etc/hosts.deny file. Put this file in any...
Platforms: *nix

SSHatter uses a brute force technique to determine the how to log into an SSH server. The project simply tries each combination in a list of usernames and passwords to determine which ones successfully log in. Whats New in This Release: - Modified to allow multiple hostnames and usernames -...
Platforms: *nix

THC-pptp-bruter is a brute force program against pptp vpn endpoints (tcp port 1723). Tested against Windows and Cisco gateways. Exploits a weakness in Microsofts anti-brute force implementation which makes it possible to try 300 passwords the second. THC-pptp-bruter currently only supports...
Platforms: *nix

Simple UI to test the effectiveness of a heuristic algorithm against the brute force method for path finding among an arbitrary number of arbitrarily placed points on a grid. This is an educational project, don't expect new and better methods.
Platforms: Mac

w3bfukk0r is a forced browsing tool which scans Web servers for a directory by using the HTTP HEAD command and a brute force mechanism based on a word list. w3bfukk0r supports HTTP and HTTPS, does banner grabbing, and allows User-Agent faking..
Platforms: *nix

A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
Platforms: Mac, BSD, Linux

HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
Platforms: Windows, Mac, Linux

Geocaching Hint Solver is a simple tool to encode/decode text using ROT13, ROT5, ROT18, ROT47 and ROT-N ciphers. It can also break Caesar cipher by the brute-force method. It is very useful for all players of the Geocaching game. Requirements: Windows Phone 8.1, Windows Phone 8, Windows Phone 7.5
Platforms: Windows Phone

If your Windows server is publicly available on Internet, then there is a 100% probability that hackers, network scanners and brute force robots are trying to guess your Administator login and password - as we speak
Using current logins and password dictionaries, they will automatically try to...
Platforms: Windows, Windows 8, Windows 7

Default Wordpress installation is vulnerable to brute force and dictionary attacks, because there is no limit how many times user can use invalid password before finding the correct one. This plugin closes this security hole by introducing maximum number of invalid login attempts. When someone...
Platforms: PHP

GNOME DVB Daemon is a daemon written in Vala based on GStreamer to setup your DVB devices, record and watch TV shows and browse EPG. It can be controlled by any application via its D-Bus interface. Features Supports DVB-C, DVB-S and DVB-T devices UI to scan for channels with initial tuning...
Platforms: *nix